aff1f4ab94
The following parameters are now available: * hardeningDisable To disable specific hardening flags * hardeningEnable To enable specific hardening flags Only the cc-wrapper supports this right now, but these may be reused by other wrappers, builders or setup hooks. cc-wrapper supports the following flags: * fortify * stackprotector * pie (disabled by default) * pic * strictoverflow * format * relro * bindnow
19 lines
442 B
Nix
19 lines
442 B
Nix
{ stdenv, fetchurl }:
|
|
|
|
stdenv.mkDerivation rec {
|
|
name = "which-2.21";
|
|
|
|
src = fetchurl {
|
|
url = "mirror://gnu/which/${name}.tar.gz";
|
|
sha256 = "1bgafvy3ypbhhfznwjv1lxmd6mci3x1byilnnkc7gcr486wlb8pl";
|
|
};
|
|
|
|
# FIXME needs gcc 4.9 in bootstrap tools
|
|
hardeningDisable = [ "stackprotector" ];
|
|
|
|
meta = with stdenv.lib; {
|
|
homepage = http://ftp.gnu.org/gnu/which/;
|
|
platforms = platforms.all;
|
|
license = licenses.gpl3;
|
|
};
|
|
}
|